Name | CVE-2025-29366 |
Description | In mupen64plus v2.6.0 there is an array overflow vulnerability in the write_rdram_regs and write_rdram_regs functions, which enables executing arbitrary commands on the host machine. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
mupen64plus-core (PTS) | bullseye | 2.5-7 | vulnerable |
bookworm | 2.5.9+341+gf82b37bf-1 | vulnerable | |
forky, sid, trixie | 2.6.0-2 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
mupen64plus-core | source | (unstable) | (unfixed) | unimportant |
https://github.com/Giles-one/mupen64plusEscape/tree/main/BUG1
https://github.com/mupen64plus/mupen64plus-core/pull/1080
https://github.com/mupen64plus/mupen64plus-core/pull/1119
https://github.com/mupen64plus/mupen64plus-core/pull/1122
https://github.com/mupen64plus/mupen64plus-core/pull/1123
Negligible security impact